Many companies and families use keylogging as a method of keeping control over the content viewed and shared on a computer. If you've been told that your activity is monitored via keylogger, it may be wiser to discuss this with whomever owns the computer, rather than trying to locate and disable the keylogger. If you believe that malware or a hacker installed a keylogger to gain access to your personal data, then removing the keylogger is the first step to protecting your data.

Hardware Keyloggers

A basic hardware keylogger works by connecting a small piece of hardware between the connection of your keyboard and your computer. It stores all keystrokes in a file on the keylogger, which the owner can review at their leisure. Check this connection to see if any hardware intercepts your keyboard. If so, remove it and connect your keyboard to your computer. You should also check your keyboard to see if it has been tampered with in any way, in case someone inserted some sort of hardware keylogger into your keyboard.

Software Keylogger

Software keyloggers work by running in the background on your computer. These are often set up to be undetectable. Software keyloggers behave like malware, like a Rootkit. These programs activate during the boot process and many anti-virus programs have trouble detecting them. You can use software to detect the presence of a keylogger, or go searching on your own for these hidden programs. Common keyloggers for the Mac include Aobo Mac OS X Keylogger and Elite Keylogger -- although, those are by no means the only ones.

Security Software

While some anti-virus software may have trouble finding keyloggers, some are set up with that task in mind. MacScan and Intego Mac Internet Security both have a good reputation for their ability to protect your files and detect keyloggers on your system. MacScan offers a list of programs (including keyloggers) it can detect on it's website. (Links in Resources.) MacScan and Intego are both commercial products that offer a free trial.

Manual Detection

Most software keyloggers actively hide when running, and don't show up in the Applications folder. However, you can open Activity Monitor to view all running processes. Look for processes you don't recognize, and take action to find out if they might be a renamed keylogger process. You can also view running processes in the terminal using the "Top" command. You can also use the "chrootkit" command in the terminal to check for the presence of rootkits on your system.

Safety

If you're worried about revealing your passwords and other sensitive personal information via keylogger, you might consider using an on-screen keyboard when entering such data. If you're certain that you've been infected with a keylogger and you cannot detect it, you may want to consider starting fresh and reinstalling your operating system.

About the Author

Ashley Poland has been writing since 2009. She has worked with local online businesses, supplying print and web content, and pursues an active interest in the computer, technology and gaming industries. In addition to content writing, Poland is also a fiction writer. She studied creative writing at Kansas State University.